Journal articles on the topic 'Information privacy law'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information privacy law.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Moreham, N. A. "BEYOND INFORMATION: PHYSICAL PRIVACY IN ENGLISH LAW." Cambridge Law Journal 73, no. 2 (July 2014): 350–77. http://dx.doi.org/10.1017/s0008197314000427.
Full textO’Callaghan, Patrick. "False Privacy and Information Games." Journal of European Tort Law 4, no. 3 (November 1, 2013): 282–305. http://dx.doi.org/10.1515/jetl-2013-0019.
Full textLitman, Jessica. "Information Privacy/Information Property." Stanford Law Review 52, no. 5 (May 2000): 1283. http://dx.doi.org/10.2307/1229515.
Full textRowlingson, R. R. "Marrying privacy law to information security." Computer Fraud & Security 2006, no. 8 (August 2006): 4–6. http://dx.doi.org/10.1016/s1361-3723(06)70408-0.
Full textCiocchetti, Corey A. "E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors." American Business Law Journal 44, no. 1 (March 2007): 55–126. http://dx.doi.org/10.1111/j.1744-1714.2007.00031.x.
Full textBlume, Peter. "Danish Data Protection with Respect to Law Libraries." International Journal of Legal Information 31, no. 3 (2003): 452–61. http://dx.doi.org/10.1017/s0731126500003735.
Full textMoore, Adam D. "Privacy, Speech, and the Law." Journal of Information Ethics 22, no. 1 (April 1, 2013): 21–43. http://dx.doi.org/10.3172/jie.22.1.21.
Full textZhu, Wei. "Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis." Journal of Environmental and Public Health 2022 (October 7, 2022): 1–12. http://dx.doi.org/10.1155/2022/1558161.
Full textHartshorne, John. "The need for an intrusion upon seclusion privacy tort within English law." Common Law World Review 46, no. 4 (November 23, 2017): 287–305. http://dx.doi.org/10.1177/1473779517739798.
Full textSolove, Daniel J. "Privacy and Power: Computer Databases and Metaphors for Information Privacy." Stanford Law Review 53, no. 6 (July 2001): 1393. http://dx.doi.org/10.2307/1229546.
Full textDolan, Bridget. "Medical records: Disclosing confidential clinical information." Psychiatric Bulletin 28, no. 2 (February 2004): 53–56. http://dx.doi.org/10.1192/pb.28.2.53.
Full textJane E., Kirtley. "Information law: Freedom of information, privacy, open meetings, other access laws." Government Information Quarterly 7, no. 3 (January 1990): 373–74. http://dx.doi.org/10.1016/0740-624x(90)90037-o.
Full textFrankel, Susy. "The Copyright and Privacy Nexus." Victoria University of Wellington Law Review 36, no. 3 (October 1, 2005): 507. http://dx.doi.org/10.26686/vuwlr.v36i3.5607.
Full textMo, Jojo YC. "In search of a privacy action against breaches of physical privacy in Hong Kong." Common Law World Review 47, no. 4 (October 22, 2018): 225–47. http://dx.doi.org/10.1177/1473779518802571.
Full textKatzav, Gilad. "Compartmentalised data protection in South Africa: The right to privacy in the Protection of Personal Information Act." South African Law Journal 139, no. 2 (2022): 432–70. http://dx.doi.org/10.47348/salj/v139/i2a8.
Full textCaloyannides, M. "Privacy vs. information technology." IEEE Security & Privacy 1, no. 1 (January 2003): 100–103. http://dx.doi.org/10.1109/msecp.2003.1177005.
Full textNissenbaum, Helen. "Protecting Privacy in an Information Age: The Problem of Privacy in Public." Law and Philosophy 17, no. 5/6 (November 1998): 559. http://dx.doi.org/10.2307/3505189.
Full textWang, Zhanjiang, and Qifeng Yue. "Privacy Law Protection Based on the Information Security Assurance Algorithm." Computational Intelligence and Neuroscience 2022 (September 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/8006605.
Full textBeall, Christopher P. "The Exaltation of Privacy Doctrines over Public Information Law." Duke Law Journal 45, no. 6 (April 1996): 1249. http://dx.doi.org/10.2307/1372887.
Full textCollins, Roy. "Information Technology and the Law." HortScience 31, no. 4 (August 1996): 697e—697. http://dx.doi.org/10.21273/hortsci.31.4.697e.
Full textOtt, Racheal. "Privacy Enhancing Technologies: Protecting Information Online." Computer Fraud & Security 2000, no. 1 (January 2000): 11–12. http://dx.doi.org/10.1016/s1361-3723(00)01018-6.
Full textTigerstrom, Barbara Von. "Current developments in Canadian privacy and information law: Implications for telehealth." Journal of Telemedicine and Telecare 6, no. 2_suppl (August 2000): 83–85. http://dx.doi.org/10.1258/1357633001935716.
Full textLoughrey, Joan. "Medical information, confidentiality and a child’s right to privacy." Legal Studies 23, no. 3 (September 2003): 510–35. http://dx.doi.org/10.1111/j.1748-121x.2003.tb00224.x.
Full textUnderwood, Julie. "Under The Law." Phi Delta Kappan 98, no. 8 (May 2017): 74–75. http://dx.doi.org/10.1177/0031721717708303.
Full textBamberger, Kenneth A., and Ariel Evan Mayse. "PRE-MODERN INSIGHTS FOR POST-MODERN PRIVACY: JEWISH LAW LESSONS FOR THE BIG DATA AGE." Journal of Law and Religion 36, no. 3 (December 2021): 495–532. http://dx.doi.org/10.1017/jlr.2021.90.
Full textGoreham, Richard A. "Le droit à la vie privée des personnes homosexuelles." Homosexualité et droit 25, no. 4 (April 12, 2005): 843–72. http://dx.doi.org/10.7202/042629ar.
Full textvan Harten, Dirk, and Rinie van Est. "Privacy in an Information Society." Journal of Contingencies and Crisis Management 11, no. 1 (March 2003): 1. http://dx.doi.org/10.1111/1468-5973.1101001.
Full textBomba, David, and George Hallit. "Will the new Australian Health Privacy Law provide adequate protection?" Australian Health Review 25, no. 3 (2002): 141. http://dx.doi.org/10.1071/ah020141a.
Full textParks, Andrew. "Unfair Collection: Reclaiming Control of Publicly Available Personal Information from Data Scrapers." Michigan Law Review, no. 120.5 (2022): 913. http://dx.doi.org/10.36644/mlr.120.5.unfair.
Full textParks, Andrew. "Unfair Collection: Reclaiming Control of Publicly Available Personal Information from Data Scrapers." Michigan Law Review, no. 120.5 (2022): 913. http://dx.doi.org/10.36644/mlr.120.5.unfair.
Full textBaker, C. Edwin. "AUTONOMY AND INFORMATIONAL PRIVACY, OR GOSSIP: THE CENTRAL MEANING OF THE FIRST AMENDMENT." Social Philosophy and Policy 21, no. 2 (June 4, 2004): 215–68. http://dx.doi.org/10.1017/s0265052504212092.
Full textMustapha, Ismail Adua. "MACHINE-READABLE TRAVEL DOCUMENTS IN AVIATION SECURITY AND INFORMATION PRIVACY: AN ISLAMIC LAW PERSPECTIVE." IIUM Law Journal 28, no. 1 (June 30, 2020): 139–64. http://dx.doi.org/10.31436/iiumlj.v28i1.502.
Full textÁsványi, Zsófia. "Technology vs privacy at work." Management 27, no. 2 (December 22, 2022): 261–82. http://dx.doi.org/10.30924/mjcmi.27.2.14.
Full textShchukina, Tatiana. "Canada's Digital Charter becomes law." Russia and America in the 21st Century, no. 6 (2022): 0. http://dx.doi.org/10.18254/s207054760023515-3.
Full textAli, S. Nageeb, and Roland Bénabou. "Image versus Information: Changing Societal Norms and Optimal Privacy." American Economic Journal: Microeconomics 12, no. 3 (August 1, 2020): 116–64. http://dx.doi.org/10.1257/mic.20180052.
Full textSoone, Ants. "Exchange of Tax Information and Privacy in Estonia." Intertax 44, Issue 3 (March 1, 2016): 279–83. http://dx.doi.org/10.54648/taxi2016019.
Full textSchwab, Abraham P., Hung S. Luu, Jason Wang, and Jason Y. Park. "Genomic Privacy." Clinical Chemistry 64, no. 12 (December 1, 2018): 1696–703. http://dx.doi.org/10.1373/clinchem.2018.289512.
Full textBurdon, Mark, and Brydon Wang. "Implementing COVIDSafe: The Role of Trustworthiness and Information Privacy Law." Law, Technology and Humans 3, no. 1 (May 4, 2021): 35–50. http://dx.doi.org/10.5204/lthj.1808.
Full textWilson, Steve. "The collision between Big Data and privacy law." Journal of Telecommunications and the Digital Economy 2, no. 3 (May 26, 2020): 15. http://dx.doi.org/10.18080/jtde.v2n3.283.
Full textMagalhaes, MarcusAbreu de. "Data protection regulation: a comparative law approach." International Journal of Digital Law 2, no. 2 (August 15, 2021): 33–53. http://dx.doi.org/10.47975/ijdl.magalhaes.v.2.n.2.
Full textBelhadjali, Moncef, Sami Abbasi, and Gary Whaley. "Personal Information Privacy: Some Findings on Gender Difference." Archives of Business Research 9, no. 7 (July 29, 2021): 95–99. http://dx.doi.org/10.14738/abr.97.10549.
Full textMaveal, Gary M. "Access to Information Held by the State and Privacy." American Journal of Comparative Law 38 (1990): 491. http://dx.doi.org/10.2307/840555.
Full textWang, Faye Fangfei. "Culture and trust in privacy information protection." International Review of Law, Computers & Technology 24, no. 2 (July 2010): 143–44. http://dx.doi.org/10.1080/13600861003748193.
Full textMagrath, Paul. "Judgments as Public Information." Legal Information Management 15, no. 3 (September 2015): 189–95. http://dx.doi.org/10.1017/s1472669615000468.
Full textBaker, Christina, Cynthia A. Galemore, and Kerri McGowan Lowrey. "Information Sharing in the School Setting During a Public Health Emergency." NASN School Nurse 35, no. 4 (May 15, 2020): 198–202. http://dx.doi.org/10.1177/1942602x20925031.
Full textSmith, Lee Ann. "Privacy Pilfering at the Library." North Carolina Libraries 63, no. 1 (May 15, 2008): 25–28. http://dx.doi.org/10.3776/ncl.v63i1.64.
Full textBygrave, Lee A. "Review: The Law of Privacy and the Media." International Journal of Law and Information Technology 13, no. 2 (2005): 286–89. http://dx.doi.org/10.1093/ijlit/eai012.
Full textSerohin, Vitalii. "INFORMATION PRIVACY: A CONCEPTUAL APPROACH." Constitutional and legal academic studies, no. 2 (July 16, 2021): 52–60. http://dx.doi.org/10.24144/2663-5399.2020.2.06.
Full textde Oliveira Martins, Maria Inês. "Risk Assessment vs. Right to Privacy: The Access to Health Information on the Insurance Candidate through Questionnaires and the Right to Privacy." European Journal of Health Law 20, no. 1 (2013): 63–78. http://dx.doi.org/10.1163/15718093-12341254.
Full textWalrath, David. "Privacy and Information Disclosure: An Economic Analysis of the Gramm-Leach-Bliley Act." Policy Perspectives 24 (May 4, 2017): 55. http://dx.doi.org/10.4079/pp.v24i0.17602.
Full text